IDG News Service - A simple piece of malicious software is circulating that steals Litecoins, a virtual currency based on the Bitcoin system. Security vendor ESET wrote the malware infects Windows computers. The program tries to steal ...
Tags: Computer Products, software, network
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localization to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
A new variant of the Citadel financial malware uses in-browser injection techniques combined with extensive content localisation to steal log-in credentials and credit card information from users in different countries, according to ...
Tags: Computer Products, software
LinkedIn's domain name was temporarily redirected to a third-party server Thursday, which resulted in a service outage and potentially put user accounts at risk of compromise. Uptime monitoring service Pingdom recorded that LinkedIn was ...
The average organisation believes it would spot a data breach in 10 hours, a McAfee global survey of IT professionals has found. But is that result good, indifferent or an indication of the downright complacent? The firm’s ...
Tags: Data Breaches, McAfee
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs. In comments to the South ...
Tags: NSA, Classified Data, Edward Snowden
Security researchers have identified multiple samples of the recently discovered "KitM" spyware for Mac OS X, including one dating back to December 2012 and targeting German-speaking users. KitM (Kumar in the Mac), also known as HackBack, ...
Tags: OS X Spyware, Mac, Computer Products
The Android threat landscape is growing in both size and complexity with cybercriminals adopting new distribution methods and building Android-focused malware services, according to a report from Finnish security vendor F-Secure. The ...
Tags: Android, Computer Products
A new cloud version of SAP's Afaria mobile device management software offers IT departments a more convenient way of controlling mobile devices. As with its other cloud-based offerings, SAP hopes to attract enterprises to the cloud-based ...
Tags: SAP, Mobile Device, Amazon
Mobile security vendor Lookout plans to start flagging as adware mobile apps that use aggressive ad networks if they don't obtain explicit consent from users before engaging in behavior that potentially invades privacy. Ad networks, ...
Tags: Mobile security vendor, Lookout
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the ...
Tags: Support Cyberattacks, Barack Obama
China's government and military appear to be directly involved in cyber-attacks against the U.S., according to a report released Monday by the U.S. Department of Defence. The conclusion, contained in an?annual report?evaluating China's ...
Tags: Pentagon, Cyberattacks, Computer Products
A spokesman for the U.S. Army Corps of Engineers today downplayed the significance of a recent incident of unauthorized access to a database containing potentially sensitive information on thousands of high hazard dams across the country. ...
Tags: Computer Products, software
Apple on Tuesday patched Java for the aged OS X Snow Leopard and tweaked Safari to give users more control over what websites they let run the vulnerability plagued Oracle software. Oracle on Tuesday shipped an update for Java 6 and Java ...
The Department of Homeland Security (DHS) has a warning for organizations that post a lot of business and personal information on public web pages and social media sites: Don't do it. Phishers, the agency said in an alert this week, look ...
Tags: web pages, social media